Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

New posts in reverse-engineering

Programmatically edit a Google doc with JavaScript

Windows Heap Chunk Header Parsing and Size Calculation

Why do Compilers put data inside .text(code) section of the PE and ELF files and how does the CPU distinguish between data and code?

Is there a tool to allow inspecting .NET objects in a running process?

.net reverse-engineering

Reverse Engineering a C# Solution

Reverse engineering on my simple C program

What are the key differences between IDA and x64dbg? [closed]

Disassembler for Linux capable of disassembling old DOS .COM/.EXE files

Why is ebx saved in the stack frame of a simple function, calling gets?

Binary Bomb - Phase 4

How does one disassemble Pro*C/C++ programs? [closed]

Differences between call, push+ret and push+jump in assembly

sub eax,0 - does it do anything?

Secure Java from reverse-engineering using industry grade encryption

How to check if binaries are built from particular sources

java reverse-engineering

When analyzing a binary compiled from Swift, is it possible to figure out the Swift method name for a function that has no symbol?

"PrivateImplementationDetails" function when decompiling a C #

Reverse Engineering?